CS 56   <ul><li>Networking Essentials </li></ul>Chapter 3 Understanding Network Architecture  Sonny Huang
Chapter 3  Understanding Network Architecture   Outline Access Methods   How Networks Send Data   Ethernet
Access Methods   <ul><li>Access Methods </li></ul><ul><li>1. Function of Access Methods </li></ul><ul><li>A. Overview </li...
Access Methods   <ul><li>2. Receiving computer must access cable with reasonable assurance that data has not been destroye...
Access Methods   <ul><li>  </li></ul><ul><li>Video Note   c03dem01, c03dem02, and d03dem03 videos show how access methods ...
Access Methods   <ul><li>B. Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) Access Method </li></ul><ul><...
Access Methods   <ul><li>Computers can transmit data only if the cable is free. </li></ul>
Access Methods   <ul><li>2. Contention Method. </li></ul><ul><li>a. Computers on the network contend, or compete, for an o...
Access Methods   <ul><li>Video Note   c03dem06 video show why CSMA/CD is considered a contention method. </li></ul><ul><li...
Access Methods   <ul><li>C.  Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CA) Access Method </li></ul><ul>...
Access Methods   <ul><li>D. Token-Passing Access Method </li></ul><ul><li>1. A special type of packet, called a token, cir...
Access Methods   Token Passing access method
Access Methods   <ul><li>Receiving computer reads the data and sets a flag that says the data has been received. It then p...
Access Methods   <ul><li>E. Demand Priority Access Method </li></ul><ul><li>1. Overview </li></ul><ul><li>a. Designed for ...
Access Methods   <ul><li>f. End node can be a computer, bridge, router, or switch. </li></ul>Start-bus network access meth...
Access Methods   <ul><li>2. Demand Priority Contention </li></ul><ul><li>a. Computers contend (transmit at the same time)....
Access Methods   <ul><li>See major points of each of the access methods in the access methods summary on page 115. </li></...
How Networks Send Data   <ul><li>How Networks Send Data </li></ul><ul><li>1 . The Function of Packets in Network Communica...
How Networks Send Data   <ul><li>2. Impact of retransmitting large units of data multiply network traffic. </li></ul><ul><...
How Networks Send Data   <ul><li>  </li></ul><ul><li>B. Sender breaks data into packets and adds special control informati...
How Networks Send Data   <ul><li>3. Session control codes (such as error correction) that indicate the need for retransmis...
How Networks Send Data   <ul><li>2. Header </li></ul><ul><li>a. Alert signal indicating  </li></ul><ul><li>packet is being...
How Networks Send Data   <ul><li>4. Trailer </li></ul><ul><li>a. Exact content of the trailer varies depending on the comm...
How Networks Send Data   <ul><li>C. Example: Packets in Printing </li></ul><ul><li>1. Sending computer establishes a conne...
How Networks Send Data   <ul><li>2. Computer breaks the large print job into packets containing: </li></ul><ul><li>a. Sour...
How Networks Send Data   <ul><li>3. NIC in each computer examines the receiver’s address on all packets sent on its segmen...
How Networks Send Data   <ul><li>4. Packets enter the destination computer (print server) through the cable into the NIC. ...
How Networks Send Data   <ul><li>5. No computer resources are used until the NIC identifies a packet addressed to itself. ...
Ethernet   <ul><li>Ethernet </li></ul><ul><li>1. Origin of Ethernet </li></ul><ul><li>A. Late 1960’s, the University of Ha...
Ethernet   <ul><li>2. Ethernet Specifications </li></ul><ul><li>A. International Organization for Standardization (ISO) </...
Ethernet   <ul><li>  </li></ul><ul><li>Ethernet became the basis for IEEE 802.3. </li></ul><ul><li>3. Ethernet Features </...
Ethernet   <ul><li>B. Ethernet Basics </li></ul><ul><li>1. Topology: Linear bus or star bus </li></ul><ul><li>2. Architect...
Ethernet   <ul><li>  C.  The Ethernet Frame Format </li></ul><ul><li>1. Ethernet breaks data into frames. </li></ul><ul><l...
Ethernet   <ul><li>2. Parts of the frame: </li></ul><ul><li>a. Preamble, the start of the frame </li></ul><ul><li>b. Desti...
Ethernet   <ul><li>4. 10-Mbps IEEE Standards </li></ul><ul><li>A. 10BaseT Standard </li></ul><ul><li>  </li></ul><ul><li>S...
Ethernet   <ul><li>3. Uses hubs (multiport repeaters) from wiring closets. </li></ul><ul><li>4. Configured as star, but in...
Ethernet   <ul><li>5. Each computer has two pairs of wire: one pair receives data and one pair transmits. </li></ul><ul><l...
Ethernet   <ul><li>B. 10Base2 Standard </li></ul><ul><li>  </li></ul><ul><li>See 10Base2 specifications summary in Table 3...
Ethernet   <ul><li>4. Maximum length of 185 meters (607 feet); minimum of 0.5 meters (20 inches). </li></ul><ul><li>5. Thi...
Ethernet   <ul><li>8. Uses 5-4-3 rule. </li></ul><ul><li>  The 5-4-3 rule can combine as many as five cable segments conne...
Ethernet   <ul><li>C. 10Base5 Standard </li></ul><ul><li>  </li></ul><ul><li>See 10Base5 specifications summary in Table 3...
Ethernet   <ul><li>6. Transceiver cable uses a DIX or AUI 15-port to connect the transceiver to the NIC. </li></ul><ul><li...
Ethernet   <ul><li>7. N-series connectors, including N-series barrel connectors, and N-series terminators. </li></ul>Thick...
Ethernet   <ul><li>8. Uses 5-4-3 rule. </li></ul>The thicknet 5-4-3 rules: 5 backbone segments , 4 repeaters, and 3 popula...
Ethernet   <ul><li>9. Maximum length of 50 meters (164 feet); minimum of 2.5 meters (about 8 feet). </li></ul><ul><li>D. C...
Ethernet   <ul><li>E. 10BaseFL Standard </li></ul><ul><li>1. Ethernet using fiber-optic cable to connect computers and rep...
Ethernet   <ul><li>5. 100-Mbps IEEE Standards </li></ul><ul><li>A. Able to support high-bandwidth applications: </li></ul>...
Ethernet   <ul><li>2. Specifications: </li></ul><ul><li>a.  Minimum data rate of 100 Mbps </li></ul><ul><li>b.  Cascading ...
Ethernet   <ul><li>3. Topology. </li></ul><ul><li>a.  Star topology in which all computers are  attached to a hub. </li></...
Ethernet   <ul><li>4. Limitations of 100BaseVG: </li></ul><ul><li>a.  Requires own hubs and cards </li></ul><ul><li>b.  Tw...
Ethernet   <ul><li>C. 100BaseX Ethernet Standard </li></ul><ul><li>  </li></ul><ul><li>See 100BaseX Media Specification li...
Ethernet   <ul><li>6.  Performance Considerations </li></ul><ul><li>A. Ethernet architecture can use multiple communicatio...
Ethernet   <ul><li>  </li></ul><ul><li>Router actually breaks the single segment into two; the bridge just creates two col...
Ethernet   <ul><li>C. NOSs on Ethernet </li></ul><ul><li>1. Microsoft Windows 95, Windows 98, and Windows 2000 </li></ul><...
Ethernet   <ul><li>  </li></ul><ul><li>Review the table summarizing the specifications for Ethernet architecture on page 1...
Token Ring <ul><li>  Token Ring </li></ul><ul><li>1. Overview </li></ul><ul><li>A. General Information </li></ul><ul><li>1...
Token Ring <ul><li>American National Standards Institute (ANSI) is an organization that was formed in 1918 for the develop...
Token Ring <ul><li>  </li></ul><ul><li>Logical electrical mode of transmission. Hubs may be powered or not. All stations o...
Token Ring <ul><li>2. Token Ring Basics </li></ul><ul><li>a. Star-wired ring topology </li></ul><ul><li>b. Token passing a...
Token Ring <ul><li>See Table 3.9, Components  </li></ul><ul><li>of a Token Ring Frame,  </li></ul><ul><li>on page 143. </l...
Token Ring <ul><li>5. CRC Error Checking. </li></ul><ul><li>6. End delimiter indicates the end of frame. </li></ul><ul><li...
Token Ring <ul><li>A. Overview </li></ul><ul><li>1. First computer on the network generates a token. </li></ul><ul><li>2. ...
Token Ring <ul><li>  </li></ul><ul><li>Token passing is considered deterministic, which means that a computer cannot force...
Token Ring <ul><li>  6. Each computer acts as a unidirectional repeater, regenerates the token, and passes it along. </li>...
Token Ring <ul><li>13. Only one token at a time can be active on the network. </li></ul><ul><li>14. Token travels in only ...
Token Ring <ul><li>B. Monitoring the System </li></ul><ul><li>1. First computer online is assigned to monitor network acti...
Token Ring <ul><li>c. If station does not receive an expected announcement from its upstream neighbor it sends a message i...
Token Ring <ul><li>e. If unable to reconfigure automatically, manual intervention is required. </li></ul><ul><li>3. Recogn...
Token Ring <ul><li>3. Hardware Components </li></ul><ul><li>A. The Hub </li></ul><ul><li>1. Overview </li></ul><ul><li>a. ...
Token Ring <ul><li>2. Capacity </li></ul><ul><li>a. IBM MSAU has 10 connection ports creating a logical ring of eight stat...
Token Ring <ul><li>c. Hubs must be connected in a ring; ring-out on one hub must connect to ring-in on the adjacent hub. <...
Token Ring <ul><li>3. Built-in Fault Tolerance </li></ul><ul><li>a. NIC failure should bring down ring. </li></ul><ul><li>...
Token Ring <ul><li>B. Cabling </li></ul><ul><li>1. Overview </li></ul><ul><li>a. IBM Type 1, 2, 3; </li></ul><ul><li>  usu...
Token Ring <ul><li>2. Patch Cables </li></ul><ul><li>a. Extend connection between computer and MSAU or between two MSAUs. ...
Token Ring <ul><li>e. Media filter required to make connection between Token Ring interface card and standard RJ-11/RJ-45 ...
Token Ring <ul><li>6. Repeaters </li></ul><ul><li>a. Increase Token Ring cable distances. </li></ul><ul><li>b. Actively re...
Token Ring <ul><li>8. Fiber-Optic Cable </li></ul><ul><li>a. Well suited for unidirectional, high-speed fiber-optic cable....
Token Ring <ul><li>4. Future of Token Ring Networks </li></ul><ul><li>  </li></ul><ul><li>See Chapter 6 for discussion of ...
Token Ring <ul><li>  See Token Ring specifications in Table 3.10 on page 151. </li></ul>
AppleTalk Network <ul><li>  AppleTalk Environment </li></ul><ul><li>A. AppleTalk </li></ul><ul><li>1. Overview </li></ul><...
AppleTalk Network <ul><li>b. The device broadcasts the address to see if any other device is using it. </li></ul><ul><li>c...
AppleTalk Network <ul><li>B. LocalTalk </li></ul><ul><li>1. Overview </li></ul><ul><li>a. CSMA/CA access method in STP bus...
AppleTalk Network <ul><li>Can also accept UTP or fiber-optic cable. </li></ul><ul><li>  </li></ul><ul><li>2. Not widely us...
AppleTalk Network <ul><li>  </li></ul><ul><li>Workgroups are divided into zones to ease congestion. </li></ul>Three zones ...
AppleTalk Network <ul><li>D. EtherTalk </li></ul><ul><li>1. EtherTalk allows AppleTalk to use Ethernet coaxial cable (Thin...
AppleTalk Network <ul><li>2. ArcNet Environment </li></ul><ul><li>A. Overview </li></ul><ul><li>1. Datapoint Corporation d...
AppleTalk Network <ul><li>2. Simple, inexpensive, flexible network architecture designed for workgroup-sized networks. </l...
AppleTalk Network <ul><li>| 4. ArcNet packet includes source and destination addresses, and up to 508 bytes of data. </li>...
AppleTalk Network <ul><li>| 4. ArcNet packet includes source and destination addresses, and up to 508 bytes of data. </li>...
AppleTalk Network <ul><li>C. Hardware </li></ul><ul><li>1. Hubs can be active, passive, or smart. </li></ul><ul><li>  </li...
AppleTalk Network <ul><li>3. Maximum cable length between active hub and workstation is 610 meters (2000 feet). </li></ul>...
AppleTalk Network <ul><li>D. EtherTalk </li></ul><ul><li>1. EtherTalk allows AppleTalk to use Ethernet coaxial cable (Thin...
Upcoming SlideShare
Loading in …5
×

CS56ch03.ppt

747 views
694 views

Published on

1 Comment
0 Likes
Statistics
Notes
  • Be the first to like this

No Downloads
Views
Total views
747
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
31
Comments
1
Likes
0
Embeds 0
No embeds

No notes for slide

CS56ch03.ppt

  1. 1. CS 56 <ul><li>Networking Essentials </li></ul>Chapter 3 Understanding Network Architecture Sonny Huang
  2. 2. Chapter 3 Understanding Network Architecture Outline Access Methods How Networks Send Data Ethernet
  3. 3. Access Methods <ul><li>Access Methods </li></ul><ul><li>1. Function of Access Methods </li></ul><ul><li>A. Overview </li></ul><ul><li>1. Rules that define how a computer puts data on and takes it from the network cable is known as access method. </li></ul><ul><li>2. Access methods regulate the flow of network traffic. </li></ul><ul><li>B. Traffic Control on the Cable </li></ul><ul><li>1. Access the cable without running into other data. </li></ul>
  4. 4. Access Methods <ul><li>2. Receiving computer must access cable with reasonable assurance that data has not been destroyed in a data collision during transmission. </li></ul><ul><li>3. Prevents simultaneous access to the cable. </li></ul>Collision occurs if two computers put data on the cable at the same time
  5. 5. Access Methods <ul><li>  </li></ul><ul><li>Video Note c03dem01, c03dem02, and d03dem03 videos show how access methods help ensure orderly transmission of data on a network. </li></ul><ul><li>  </li></ul><ul><li>2. Major Access Methods </li></ul><ul><li>A. Three methods to prevent simultaneous use of the cable: </li></ul><ul><li>1. Carrier-sense multiple access methods (with collision detection and with collision avoidance) </li></ul><ul><li>2. Token-passing method </li></ul><ul><li>3. Demand-priority method </li></ul>
  6. 6. Access Methods <ul><li>B. Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) Access Method </li></ul><ul><li>1. Each computer on the network, including clients and servers, checks the cable for network traffic. </li></ul><ul><li>a. Only when there is no traffic, can data be sent. </li></ul><ul><li>b. After data is sent, no other computer can transmit until original data reaches its destination. </li></ul><ul><li>c. A data collision occurs when two or more computers send data at the same time. </li></ul><ul><li>d. When this happens, each computer stops data transmission and waits to resend when it “senses” the cable is free. </li></ul>
  7. 7. Access Methods <ul><li>Computers can transmit data only if the cable is free. </li></ul>
  8. 8. Access Methods <ul><li>2. Contention Method. </li></ul><ul><li>a. Computers on the network contend, or compete, for an opportunity to send data. </li></ul><ul><li>b. If there is data on the cable, no other computer may transmit until the data reaches its destination and cable is free. </li></ul><ul><li>c. Current implementations of CSMA/CD are so fast that users are not even aware they are using a contention access method. </li></ul><ul><li>  </li></ul><ul><li>Video Note c03dem04 and c03dem05 videos show the CSMA/CD access method. </li></ul>
  9. 9. Access Methods <ul><li>Video Note c03dem06 video show why CSMA/CD is considered a contention method. </li></ul><ul><li>  </li></ul><ul><li>3. CSMA/CD Considerations. </li></ul><ul><li>a. More computers means more network traffic. </li></ul><ul><li>b. Can be a slow access method depending on the number of users and the applications being used. </li></ul>
  10. 10. Access Methods <ul><li>C. Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CA) Access Method </li></ul><ul><li>1. Least popular of the three major access methods. </li></ul><ul><li>2. Each computer signals its intent to transmit before it actually transmits data to avoid transmission collisions. </li></ul><ul><li>3. Broadcasting the intent to transmit data increases the amount of traffic on the cable and slows down network performance. </li></ul><ul><li>  </li></ul><ul><li>Video Note c03dem07 video shows the CSMA/CA access method. </li></ul>
  11. 11. Access Methods <ul><li>D. Token-Passing Access Method </li></ul><ul><li>1. A special type of packet, called a token, circulates around a cable ring from computer to computer. </li></ul><ul><li>2. Computer wanting to send data must wait for the free token. </li></ul><ul><li>3. When computer obtains free token, it can transmit its data. </li></ul><ul><li>4. No other computer can transmit while this computer is transmitting. </li></ul><ul><li>5. No contention and no collisions take place. </li></ul><ul><li>6. No time is spent waiting to resend data due to traffic. </li></ul><ul><li>  </li></ul>
  12. 12. Access Methods Token Passing access method
  13. 13. Access Methods <ul><li>Receiving computer reads the data and sets a flag that says the data has been received. It then puts the packet back on the cable to the sending computer. The sending computer creates a new free token after it reads the flag that says the receiving computer has processed the data. </li></ul><ul><li>  </li></ul><ul><li>  </li></ul><ul><li>Video Note c03dem08, c03dem09, c03dem10, c03dem11, and c03dem12 videos show the token-passing access method. </li></ul>
  14. 14. Access Methods <ul><li>E. Demand Priority Access Method </li></ul><ul><li>1. Overview </li></ul><ul><li>a. Designed for 100 Mbps Ethernet, known as 100VG-AnyLAN. </li></ul><ul><li>b. Sanctioned and standardized by the Institute of Electrical and Electronic Engineers (IEEE) in its 802.12 specification. </li></ul><ul><li>c. Repeaters and end nodes are the two components that make up all 100VG-AnyLANs. </li></ul><ul><li>d. Repeaters are responsible for searching for requests to send. </li></ul><ul><li>e. Repeaters are responsible for noting all addresses, links, and end nodes, and verifying that they are all functioning. </li></ul>
  15. 15. Access Methods <ul><li>f. End node can be a computer, bridge, router, or switch. </li></ul>Start-bus network access method for100VG-AnyLAN is demand priority
  16. 16. Access Methods <ul><li>2. Demand Priority Contention </li></ul><ul><li>a. Computers contend (transmit at the same time). </li></ul><ul><li>b. Hub determines priority (could be based on data type). </li></ul><ul><li>c. Higher priority is transmitted first; if same, then they are alternated. </li></ul><ul><li>3. Demand Priority Considerations </li></ul><ul><li>a. Uses four pairs of wires, allowing computers to transmit and receive at the same time. </li></ul><ul><li>b. Transmissions through the hub. </li></ul><ul><li>c. No network-wide broadcasts, only computer-to-hub-to-computer. </li></ul>
  17. 17. Access Methods <ul><li>See major points of each of the access methods in the access methods summary on page 115. </li></ul><ul><li>  </li></ul><ul><li>  </li></ul><ul><li>Video Note c03dem13 and c03dem14 videos show the demand-priority access method. </li></ul>
  18. 18. How Networks Send Data <ul><li>How Networks Send Data </li></ul><ul><li>1 . The Function of Packets in Network Communications </li></ul><ul><li>A. Data sent in small, manageable packets, each wrapped with the essential information needed to get it from its source to the correct destination. </li></ul><ul><li>1. Large files flood and tie up the network. </li></ul>Large continuous streams of data slow down the network
  19. 19. How Networks Send Data <ul><li>2. Impact of retransmitting large units of data multiply network traffic. </li></ul><ul><li>3. Small packets provide timely error recovery, and the network only has to resend small amount of data. </li></ul><ul><li>  </li></ul><ul><li>Although the terms “packet” and “frame” are often used interchangeably, there are some differences based on the type of network. Packet is a unit of information transmitted as a whole from one device to another. </li></ul>Breaking data into packets
  20. 20. How Networks Send Data <ul><li>  </li></ul><ul><li>B. Sender breaks data into packets and adds special control information to each packet making it possible to: </li></ul><ul><li>1. Send original, disassembled data in small chunks. </li></ul><ul><li>2. Reassemble data in proper order at destination. </li></ul><ul><li>3. Check data for errors after it has been reassembled. </li></ul><ul><li>2. Packet Structure </li></ul><ul><li>A. Packets contain several types of data, including: </li></ul><ul><li>1. Information, such as messages or files. </li></ul><ul><li>2. Computer control data and commands, such as service requests. </li></ul>
  21. 21. How Networks Send Data <ul><li>3. Session control codes (such as error correction) that indicate the need for retransmission. </li></ul><ul><li>B. Packet Components </li></ul><ul><li>1. Common packet components: </li></ul><ul><li>a. Source address that identifies sending computer </li></ul><ul><li>b. Data intended for transmission </li></ul><ul><li>c. Destination address that identifies the recipient </li></ul><ul><li>d. Instructions telling network components how to pass data </li></ul><ul><li>e. Information to receiving computer about how to reassemble the data </li></ul><ul><li>f. Error-checking information to ensure that packet arrives intact </li></ul>
  22. 22. How Networks Send Data <ul><li>2. Header </li></ul><ul><li>a. Alert signal indicating </li></ul><ul><li>packet is being </li></ul><ul><li>transmitted </li></ul><ul><li>b. Source address </li></ul><ul><li>c. Destination address </li></ul><ul><li>d. Clock information to </li></ul><ul><li>synchronize transmission </li></ul><ul><li>3. Data </li></ul><ul><li>a. Actual data being sent: 0.5 KB to 4 KB in size </li></ul><ul><li>b. Larger files broken into smaller multiple packets </li></ul>
  23. 23. How Networks Send Data <ul><li>4. Trailer </li></ul><ul><li>a. Exact content of the trailer varies depending on the communication method, or protocol. </li></ul><ul><li>A protocol is a set of rules or standards designed to enable computers to connect with one another and to exchange information with as little error as possible. </li></ul><ul><li>  </li></ul><ul><li>b. Contains error-check component called cyclical redundancy check (CRC), a number produced by mathematical computation at source. </li></ul><ul><li>c If CRC number is calculated to be the same when it arrives, the data is assumed good; if not, it is retransmitted. </li></ul>
  24. 24. How Networks Send Data <ul><li>C. Example: Packets in Printing </li></ul><ul><li>1. Sending computer establishes a connection with the print server. </li></ul>Establishing a connection with a print server
  25. 25. How Networks Send Data <ul><li>2. Computer breaks the large print job into packets containing: </li></ul><ul><li>a. Source and destination address. </li></ul><ul><li>b. Data. </li></ul><ul><li>c. Control </li></ul><ul><li>information. </li></ul>Creating Packets
  26. 26. How Networks Send Data <ul><li>3. NIC in each computer examines the receiver’s address on all packets sent on its segment of the network. </li></ul><ul><li>a. NIC compares the incoming packets destination address with its own address. </li></ul><ul><li>b. NIC interrupts the computer only when it detects a packet addressed specifically to itself. </li></ul>Examining the receiver’s address
  27. 27. How Networks Send Data <ul><li>4. Packets enter the destination computer (print server) through the cable into the NIC. </li></ul>Network interface card(NIC) accepts packets addressed to the printer server
  28. 28. How Networks Send Data <ul><li>5. No computer resources are used until the NIC identifies a packet addressed to itself. </li></ul><ul><li>6. Network Operating System in the receiving computer reassembles the packets back into the original text file and moves the file into the computer’s memory. </li></ul>Reassembled packets sent to the printer
  29. 29. Ethernet <ul><li>Ethernet </li></ul><ul><li>1. Origin of Ethernet </li></ul><ul><li>A. Late 1960’s, the University of Hawaii developed a WAN called ALOHA using the CSMA/CD access method. </li></ul><ul><li>B. In 1972, a cabling and signaling scheme was invented at Xerox Palo Alto Research Center (PARC). </li></ul><ul><li>C. In 1975, the first Ethernet product was introduced; a system of 2.94 megabits per second (Mbps) to connect over 100 computers connected on one kilometer (.62 miles) of cable. </li></ul><ul><li>D. Xerox, Intel Corporation and Digital Equipment Corporation drew up standard for 10-Mbps Ethernet. </li></ul>
  30. 30. Ethernet <ul><li>2. Ethernet Specifications </li></ul><ul><li>A. International Organization for Standardization (ISO) </li></ul><ul><li>1. In 1978, ISO released a set of specifications for connecting dissimilar devices. </li></ul><ul><li>2. This set of specifications is referred to as the Open System Interconnect (OSI) model. </li></ul><ul><li>  </li></ul><ul><li>The OSI model is described in detail in Chapter 5. </li></ul><ul><li>  </li></ul><ul><li>B. Ethernet specification performs the same functions as the OSI physical and data-link layers of this model. </li></ul><ul><li>1. These specifications affect how hardware links or passes information back and forth. </li></ul><ul><li>2. Project 802 published by IEEE in 1980s. </li></ul><ul><li>3. The IEEE 802.3 specification. </li></ul>
  31. 31. Ethernet <ul><li>  </li></ul><ul><li>Ethernet became the basis for IEEE 802.3. </li></ul><ul><li>3. Ethernet Features </li></ul><ul><li>A. Most Popular Network Architecture </li></ul><ul><li>1. Ethernet media is passive, </li></ul><ul><li>which means it requires no </li></ul><ul><li>power source. </li></ul><ul><li>2. Will not fail unless t </li></ul><ul><li>he media is physically cut </li></ul><ul><li>or improperly terminated. </li></ul>Simple Ethernet bus network terminated at both end
  32. 32. Ethernet <ul><li>B. Ethernet Basics </li></ul><ul><li>1. Topology: Linear bus or star bus </li></ul><ul><li>2. Architecture: Baseband (digital: bidirectional) </li></ul><ul><li>3. Access method: CSMA/CD </li></ul><ul><li>4. Specifications: IEEE 802.3 </li></ul><ul><li>5. Transfer speed: 10 or 100 Mbps </li></ul><ul><li>6. Cable type: ThickNet, ThinNet, UTP </li></ul><ul><li>  </li></ul><ul><li>The most popular physical topology is a star, the manner a signal is transferred is still a bus. </li></ul>
  33. 33. Ethernet <ul><li>  C. The Ethernet Frame Format </li></ul><ul><li>1. Ethernet breaks data into frames. </li></ul><ul><li>a. Package of information transmitted in a single unit (between 64 and 1518 bytes long). </li></ul><ul><li>b. Ethernet uses 18 bytes for itself; therefore, data is between 46 and 1500 bytes long. </li></ul><ul><li>  </li></ul><ul><li> “ Packet” and “frame” can be used interchangeably; in the context of Ethernet, the term “frame” is used. </li></ul><ul><li>  </li></ul>
  34. 34. Ethernet <ul><li>2. Parts of the frame: </li></ul><ul><li>a. Preamble, the start of the frame </li></ul><ul><li>b. Destination and source address </li></ul><ul><li>c. Type of frame, usually IP or IPX (Novell’s Internetwork Packet Exchange) </li></ul><ul><li>d. Error checking field (Cyclical redundancy check (CRC) </li></ul><ul><li>  </li></ul><ul><li>Specifics of frame layout </li></ul><ul><li>vary from one type to another. </li></ul>Sample Ethernet II frame
  35. 35. Ethernet <ul><li>4. 10-Mbps IEEE Standards </li></ul><ul><li>A. 10BaseT Standard </li></ul><ul><li>  </li></ul><ul><li>See 10BaseT specifications summary in Table 3.4 on page 130. </li></ul><ul><li>  </li></ul><ul><li>1. 10-Mbps, baseband, over twisted-pair cable. </li></ul><ul><li>2. Usually unshielded twisted-pair, but STP will work. </li></ul><ul><li>  </li></ul><ul><li>UTP is by far the most popular type of cable. STP is not recommended. </li></ul>
  36. 36. Ethernet <ul><li>3. Uses hubs (multiport repeaters) from wiring closets. </li></ul><ul><li>4. Configured as star, but internally it is a bus. </li></ul>A multiport Repeater can be used to extend an Ethernet LAN
  37. 37. Ethernet <ul><li>5. Each computer has two pairs of wire: one pair receives data and one pair transmits. </li></ul><ul><li>6. Cable type is Category 3 </li></ul><ul><li>, 4, or 5 UTP. Maximum length </li></ul><ul><li>of 100 meters (328 feet); </li></ul><ul><li>minimum of 2.5 meters </li></ul><ul><li>(8 feet). </li></ul><ul><li>7. 1024 computers </li></ul><ul><li>maximum. </li></ul><ul><li>  </li></ul>A patch panel makes moving computer easy
  38. 38. Ethernet <ul><li>B. 10Base2 Standard </li></ul><ul><li>  </li></ul><ul><li>See 10Base2 specifications summary in Table 3.5 on page 132. </li></ul><ul><li>  </li></ul><ul><li>1. 10 Mbps, baseband, over thin coaxial cable. </li></ul><ul><li>2. ThinNet with BNC connectors and terminators. </li></ul><ul><li>3. BNC barrels to extend sections. </li></ul><ul><li>  </li></ul><ul><li>Be careful to limit the number of BNC barrels to maintain signal strength. </li></ul>
  39. 39. Ethernet <ul><li>4. Maximum length of 185 meters (607 feet); minimum of 0.5 meters (20 inches). </li></ul><ul><li>5. ThinNet can support maximum of 30 nodes per populated segment. </li></ul><ul><li>6. Repeaters used to extend to total of 925 meters (3035 feet). </li></ul><ul><li>  </li></ul><ul><li>Repeaters count in the total number of 30 nodes per populated segment. </li></ul><ul><li>  </li></ul><ul><li>7. Relatively inexpensive, easy to install, easy to configure. </li></ul>
  40. 40. Ethernet <ul><li>8. Uses 5-4-3 rule. </li></ul><ul><li>  The 5-4-3 rule can combine as many as five cable segments connected by four repeaters; but only three segments can have stations attached. Thus, two segments are untapped and are often referred to as “inter-repeater links.” </li></ul>The thinnet 5-4-3 rules: 5 segments, 4 repeaters, and 3 populated segments
  41. 41. Ethernet <ul><li>C. 10Base5 Standard </li></ul><ul><li>  </li></ul><ul><li>See 10Base5 specifications summary in Table 3.6 on page 135. </li></ul><ul><li>  </li></ul><ul><li>1. 10 Mbps, baseband, over 500-meter (five 100-meter) segments. </li></ul><ul><li>2. Called ThickNet or standard Ethernet. </li></ul><ul><li>3. ThickNet uses bus topology and can support up to one hundred nodes per populated segment. </li></ul><ul><li>4. ThickNet segment can be 500 meters (1640 feet) long for a total network length of 2500 meters (8200 feet). </li></ul><ul><li>5. Transceivers are devices that transmit and receive, and also provide communications between the computer and the main LAN cable. </li></ul>Thicknet cable composition
  42. 42. Ethernet <ul><li>6. Transceiver cable uses a DIX or AUI 15-port to connect the transceiver to the NIC. </li></ul><ul><li>  </li></ul><ul><li> “ AUI,” an acronym for attachment unit interface, is a 15-pin (DB-15) connector commonly used to connect a NIC to an Ethernet cable; AUIs and DIXs are discussed in Chapter 2. </li></ul><ul><li>  </li></ul>
  43. 43. Ethernet <ul><li>7. N-series connectors, including N-series barrel connectors, and N-series terminators. </li></ul>Thicknet backbone with attached transceiver and cable
  44. 44. Ethernet <ul><li>8. Uses 5-4-3 rule. </li></ul>The thicknet 5-4-3 rules: 5 backbone segments , 4 repeaters, and 3 populated segments
  45. 45. Ethernet <ul><li>9. Maximum length of 50 meters (164 feet); minimum of 2.5 meters (about 8 feet). </li></ul><ul><li>D. Combining ThickNet and ThinNet Cable </li></ul><ul><li>1. ThickNet cable is good for backbones. </li></ul><ul><li>2. ThinNet cable is used for branch segments. </li></ul><ul><li>3. Branch segments connect the computer to the backbone. </li></ul>
  46. 46. Ethernet <ul><li>E. 10BaseFL Standard </li></ul><ul><li>1. Ethernet using fiber-optic cable to connect computers and repeaters. </li></ul><ul><li>2. Accommodates long runs between buildings. </li></ul><ul><li>3. Maximum segment length of 2000 meters (about 6800 feet). </li></ul><ul><li>  </li></ul><ul><li>Speed is the same as standard Ethernet, but longer distances are possible due to fiber-optic cable. </li></ul><ul><li>  </li></ul>
  47. 47. Ethernet <ul><li>5. 100-Mbps IEEE Standards </li></ul><ul><li>A. Able to support high-bandwidth applications: </li></ul><ul><li>1. Computer-aided design (CAD) </li></ul><ul><li>2. Computer-aided manufacturing (CAM) </li></ul><ul><li>3. Video </li></ul><ul><li>4. Imaging and document storage </li></ul><ul><li>B. 100BaseVG AnyLAN Standard </li></ul><ul><li>1. 100BaseVG AnyLAN Ethernet is IEEE 802.12 standard. </li></ul><ul><li>a. Combines Ethernet and Token Ring technology </li></ul><ul><li>b. Originally developed by Hewlett Packard </li></ul>
  48. 48. Ethernet <ul><li>2. Specifications: </li></ul><ul><li>a. Minimum data rate of 100 Mbps </li></ul><ul><li>b. Cascading star topology (parent/child) over Category 3, 4, and 5 twisted-pair and fiber-optic cable </li></ul><ul><li>c. Demand priority access method </li></ul><ul><li>d. Ability to filter individually addressed frames at the hub </li></ul><ul><li>e. Support Ethernet frames and Token Ring packets </li></ul><ul><li>  </li></ul><ul><li>100BaseVG AnyLAN is also referred to as 100BaseVG, VG, and AnyLAN. </li></ul><ul><li>  </li></ul>
  49. 49. Ethernet <ul><li>3. Topology. </li></ul><ul><li>a. Star topology in which all computers are attached to a hub. </li></ul><ul><li>b. Add child hubs to the central hub to expand the network. </li></ul><ul><li>  </li></ul><ul><li>Parent hub controls transmission to computers attached by their child hubs. </li></ul>Parents hubs with five attached child hubs
  50. 50. Ethernet <ul><li>4. Limitations of 100BaseVG: </li></ul><ul><li>a. Requires own hubs and cards </li></ul><ul><li>b. Two longest cables from hub to computer less than or equal to 250 meters (810 feet) </li></ul><ul><li>c. Requires more wiring closets than 10BaseT </li></ul>
  51. 51. Ethernet <ul><li>C. 100BaseX Ethernet Standard </li></ul><ul><li>  </li></ul><ul><li>See 100BaseX Media Specification listed in Table 3.7 on page 138. </li></ul><ul><li>1. Fast Ethernet </li></ul><ul><li>2. Uses UTP Category 5 wire </li></ul><ul><li>3. Star bus topology like 10BaseT </li></ul><ul><li>4. Incorporates three media specifications: </li></ul><ul><li>a. 100BaseT4 (4-pair Category 3, 4, 5 UTP) </li></ul><ul><li>b. 100BaseTX (2-pair Category 5 UTP or STP) </li></ul><ul><li>c. 100BaseFX (2-strand fiber optic) </li></ul><ul><li>  </li></ul>
  52. 52. Ethernet <ul><li>6. Performance Considerations </li></ul><ul><li>A. Ethernet architecture can use multiple communication protocols: </li></ul><ul><li>1. NetWare </li></ul><ul><li>2. UNIX </li></ul><ul><li>3. Windows </li></ul><ul><li>4. Macintosh </li></ul><ul><li>|B. Segmentation </li></ul><ul><li>1. Divides crowded segment into two less crowded segments using bridge or router. </li></ul><ul><li>2. Reduces traffic and improves access time. </li></ul>
  53. 53. Ethernet <ul><li>  </li></ul><ul><li>Router actually breaks the single segment into two; the bridge just creates two collision domains. Bridges and routers are discussed in Chapter 7. </li></ul>Using a bridge to segment a network and reduce network traffic.
  54. 54. Ethernet <ul><li>C. NOSs on Ethernet </li></ul><ul><li>1. Microsoft Windows 95, Windows 98, and Windows 2000 </li></ul><ul><li>2. Microsoft Windows NT Workstation and Windows NT Server </li></ul><ul><li>3. Microsoft Windows 2000 Professional and Windows 2000 Server </li></ul><ul><li>4. Microsoft LAN Manager </li></ul><ul><li>5. Microsoft Windows for Workgroups </li></ul><ul><li>6. Novell NetWare </li></ul><ul><li>7. IBM LAN Server </li></ul><ul><li>8. AppleShare </li></ul><ul><li>9. UNIX </li></ul>
  55. 55. Ethernet <ul><li>  </li></ul><ul><li>Review the table summarizing the specifications for Ethernet architecture on page 140. </li></ul>
  56. 56. Token Ring <ul><li>  Token Ring </li></ul><ul><li>1. Overview </li></ul><ul><li>A. General Information </li></ul><ul><li>1. Token Ring: 802.5 specifications </li></ul><ul><li>2. Introduced by IBM in 1984 for all its computer environments, from PCs to mainframes (SNA) </li></ul><ul><li>  </li></ul><ul><li>IBM Token Ring is one implementation of IEEE 802.5, which is covered in more detail in Chapter 5. </li></ul><ul><li>  </li></ul><ul><li>3. Adopted by ANSI/IEEE in 1985 </li></ul><ul><li>  </li></ul>
  57. 57. Token Ring <ul><li>American National Standards Institute (ANSI) is an organization that was formed in 1918 for the development and adoption of trade and communication standards in the United States. ANSI is the American equivalent of the International Organization for Standardization (ISO). </li></ul><ul><li>  </li></ul><ul><li>B. Token Ring Features </li></ul><ul><li>1. Architecture </li></ul><ul><li>a. Logical ring is within the hub. </li></ul><ul><li>b. Computers are wired in a star from the hub (star-wired ring topology). </li></ul><ul><li>c. Token still passes in a ring from computer to computer. </li></ul>
  58. 58. Token Ring <ul><li>  </li></ul><ul><li>Logical electrical mode of transmission. Hubs may be powered or not. All stations on a line must be same speed. </li></ul>Logical ring, in which the physical ring is in the hub.
  59. 59. Token Ring <ul><li>2. Token Ring Basics </li></ul><ul><li>a. Star-wired ring topology </li></ul><ul><li>b. Token passing access method </li></ul><ul><li>c. IBM Type 1, 2, 3 cabling (STP or UTP) </li></ul><ul><li>d. Transfer rates of 4 Mbps or 16 Mbps </li></ul><ul><li>e. Baseband transmission </li></ul><ul><li>f. IEEE 802.5 specifications </li></ul><ul><li>  </li></ul>
  60. 60. Token Ring <ul><li>See Table 3.9, Components </li></ul><ul><li>of a Token Ring Frame, </li></ul><ul><li>on page 143. </li></ul><ul><li>  </li></ul><ul><li>C. Frame Formats </li></ul><ul><li>1. Start delimiter indicates </li></ul><ul><li> the start of the frame. </li></ul><ul><li>2. Access Control and </li></ul><ul><li>Frame Control. </li></ul><ul><li>  </li></ul><ul><li>Instructor Note See Figure 5.8, Media Access Control, described in detail on page 223. </li></ul><ul><li>  </li></ul><ul><li>3. Source and Destination Addresses. </li></ul><ul><li>4. Information or Data. </li></ul>
  61. 61. Token Ring <ul><li>5. CRC Error Checking. </li></ul><ul><li>6. End delimiter indicates the end of frame. </li></ul><ul><li>7. Frame status tells whether the frame was recognized, copied, or whether the destination address was available. </li></ul><ul><li>2. How Token Ring Network Works </li></ul><ul><li>  </li></ul><ul><li>Token is a predetermined formation of bits that permits a computer to put data on the cable. </li></ul><ul><li>  </li></ul>
  62. 62. Token Ring <ul><li>A. Overview </li></ul><ul><li>1. First computer on the network generates a token. </li></ul><ul><li>2. Token travels around the ring polling each computer. </li></ul><ul><li>3. Computer signals that it wants to transmit data and takes control of the token. </li></ul><ul><li>4. Computer cannot transmit unless it has possession of the token. </li></ul><ul><li>5. No computer can transmit data while the token is in use. </li></ul>
  63. 63. Token Ring <ul><li>  </li></ul><ul><li>Token passing is considered deterministic, which means that a computer cannot force its way on the network as in CSMA/CD. </li></ul><ul><li>  </li></ul><ul><li>|30| 6. Each computer acts as a unidirectional repeater, regenerates the token, and passes it along. </li></ul><ul><li>7. After taking control of the token, it sends a data frame out on the network. </li></ul><ul><li>8. Frame proceeds around the ring until it reaches the destination computer. </li></ul><ul><li>9. Destination computer copies the frame into its receive buffer. </li></ul><ul><li>10. Destination computer marks the status field as received. </li></ul><ul><li>11. Frame continues around the ring until sending computer receives it. </li></ul><ul><li>12. Sending computer removes the frame and generates a new token. </li></ul><ul><li>13. Only one token at a time can be active on the network. </li></ul><ul><li>14. Token travels in only one direction. </li></ul><ul><li>  </li></ul><ul><li>Instructor Note Does the token flow clockwise or counterclockwise? The answer is that it doesn’t matter. The direction taken depends on hardware connections. Logically, one can make the token travel in any direction or order. The designers of hubs determine the order in which each port is addressed, and the administrator determines the order in which computers are connected to the hub. The IEEE 802.5 standard says clockwise; the IBM publication SC30-3374, section 3, says counterclockwise. </li></ul><ul><li>  </li></ul><ul><li>B. Monitoring the System </li></ul><ul><li>1. First computer online is assigned to monitor network activity by the Token Ring system and is responsible for: </li></ul><ul><li>a. Frames being delivered and received correctly. </li></ul><ul><li>b. Frames that have circulated the ring more than once. </li></ul><ul><li>c. Ensuring only one token is on the network. </li></ul><ul><li>2. Process of monitoring is called beaconing. </li></ul><ul><li>a. Active monitor sends out a beacon announcement every seven seconds. </li></ul><ul><li>b. Beacon passed from computer to computer throughout the ring. </li></ul><ul><li>c. If station does not receive an expected announcement from its upstream neighbor it sends a message including: </li></ul><ul><li>(1) Stations address </li></ul><ul><li>(2) Address of neighbor that did not announce </li></ul><ul><li>(3) Type of beacon </li></ul><ul><li>d. Ring attempts to diagnose and repair without disrupting the entire network. </li></ul><ul><li>  </li></ul><ul><li>Instructor Note When troubleshooting, be aware the network is trying to bypass the problem. This can sometimes mask the real failure. </li></ul><ul><li>  </li></ul><ul><li>e. If unable to reconfigure automatically, manual intervention is required. </li></ul><ul><li>3. Recognizing a Computer. </li></ul><ul><li>a. When a new computer comes online the initialization includes: </li></ul><ul><li>(1) Checking for duplicate addresses. </li></ul><ul><li>(2) Notifying others of its existence. </li></ul><ul><li>3. Hardware Components </li></ul><ul><li>|31| A. The Hub </li></ul><ul><li>1. Overview </li></ul><ul><li>a. Token ring hub is known by several names: </li></ul><ul><li>(1) MAU (Multistation Access Unit) </li></ul><ul><li>(2) MSAU (MultiStation Access Unit) </li></ul><ul><li>(3) SMAU (Smart Multistation Access Unit) </li></ul><ul><li>b. The hub’s internal ring automatically converts to an external ring at each connection point when a computer is connected. </li></ul><ul><li>2. Capacity </li></ul><ul><li>a. IBM MSAU has 10 connection ports creating a logical ring of eight stations (two other ports extend the ring). </li></ul><ul><li>  </li></ul><ul><li>Instructor Note Some MSAU units are passive. For example, the IBM 8228. </li></ul><ul><li>  </li></ul><ul><li>b. Up to 33 hubs on a ring supporting 72 computers that use UTP or 260 that use STP on a MSAU-based network. </li></ul><ul><li>  </li></ul><ul><li>Instructor Note Other vendors offer hubs with more capacity; capacity depends on the vendor and the hub model. </li></ul><ul><li>  </li></ul><ul><li>|32| c. Hubs must be connected in a ring; ring-out on one hub must connect to ring-in on the adjacent hub. </li></ul><ul><li>d. Patch cables connect many MSAUs on top of each other while still forming a continuous ring. </li></ul><ul><li>3. Built-in Fault Tolerance </li></ul><ul><li>a. NIC failure should bring down ring. </li></ul><ul><li>b. MSAU will sense a failed NIC and disconnect from it. </li></ul><ul><li>c. Faulty computer or connection will not affect rest of network. </li></ul><ul><li>B. Cabling </li></ul><ul><li>1. Overview </li></ul><ul><li>a. IBM Type 1, 2, 3; usually Type 3 UTP cabling. </li></ul><ul><li>|33| b. IBM states maximum cabling distance MSAU to computer is 46 meters (150 feet), although some vendors say 152 meters (500 feet). </li></ul><ul><li>c. Maximum distance from one MSAU to another is 152 meters (500 feet). </li></ul><ul><li>d. Single Token Ring can accommodate only 260 computers with STP cable and 72 computers with UTP cable. </li></ul><ul><li>2. Patch Cables </li></ul><ul><li>a. Extend connection between computer and MSAU or between two MSAUs. </li></ul><ul><li>b. IBM Type 6, up to a maximum of 46 meters (150 feet). </li></ul><ul><li>3. Connectors </li></ul><ul><li>a. Media interface connectors (MICs), also known as universal data connectors, connect Types 1 and 2 cable. </li></ul><ul><li>b. Neither male nor female so they can be connected together. </li></ul><ul><li>c. RJ-45 for 8-pin connection for Type 3 cable. </li></ul><ul><li>d. RJ-11 for 4-pin connection for Type 3 cable. </li></ul><ul><li>e. Media filter required to make connection between Token Ring interface card and standard RJ-11/RJ-45 telephone jacks. </li></ul><ul><li>4. Media Filters </li></ul><ul><li>a. Required with Type 3 telephone twisted-pair cable. </li></ul><ul><li>b. Convert cable connectors and reduce line noise. </li></ul><ul><li>5. Patch Panels </li></ul><ul><li>a. Organize cable that runs between a MSAU and a telephone punchdown block. </li></ul><ul><li>b. Punchdown block is a kind of hardware that provides terminal connections for bare network cable ends. </li></ul><ul><li>6. Repeaters </li></ul><ul><li>a. Increase Token Ring cable distances. </li></ul><ul><li>b. Actively regenerates and retimes the Token Ring signal. </li></ul><ul><li>7. NICs </li></ul><ul><li>a. Either 4 Mbps or 16 Mbps. </li></ul><ul><li>b. If the network is a 4 Mbps network, the 16 Mbps cards can be used, but will revert to 4 Mbps mode (16 Mbps networks will not accept slower 4 Mbps cards because they cannot speed up). </li></ul><ul><li>  </li></ul><ul><li>Instructor Note Different speed cards can exist on different logical segments. </li></ul><ul><li>  </li></ul><ul><li>8. Fiber-Optic Cable </li></ul><ul><li>a. Well suited for unidirectional, high-speed fiber-optic cable. </li></ul><ul><li>b. Although more expensive, it greatly increases the range (up to 10 times that of copper). </li></ul><ul><li>4. Future of Token Ring Networks </li></ul><ul><li>  </li></ul><ul><li>Instructor Note See Chapter 6 for discussion of protocols, routers, and bridges. </li></ul><ul><li>  </li></ul><ul><li>A. Overview </li></ul><ul><li>1. Token ring is losing market share to Ethernet. </li></ul><ul><li>2. Large companies are selecting Token Ring to support mission-critical applications. </li></ul><ul><li>B. Users of token ring face the following challenges: </li></ul><ul><li>1. Complexity, manageability, cost and space requirements </li></ul><ul><li>2. Bridge and segment congestion </li></ul><ul><li>3. Upgrading to high-speed technologies </li></ul><ul><li>  </li></ul><ul><li>Instructor Note See Token Ring specifications in Table 3.10 on page 151. </li></ul>Clockwise flow of the token around the logical ring
  64. 64. Token Ring <ul><li>  6. Each computer acts as a unidirectional repeater, regenerates the token, and passes it along. </li></ul><ul><li>7. After taking control of the token, it sends a data frame out on the network. </li></ul><ul><li>8. Frame proceeds around the ring until it reaches the destination computer. </li></ul><ul><li>9. Destination computer copies the frame into its receive buffer. </li></ul><ul><li>10. Destination computer marks the status field as received. </li></ul><ul><li>11. Frame continues around the ring until sending computer receives it. </li></ul><ul><li>12. Sending computer removes the frame and generates a new token. </li></ul>
  65. 65. Token Ring <ul><li>13. Only one token at a time can be active on the network. </li></ul><ul><li>14. Token travels in only one direction. </li></ul><ul><li>  </li></ul><ul><li>Does the token flow clockwise or counterclockwise? The answer is that it doesn’t matter. The direction taken depends on hardware connections. Logically, one can make the token travel in any direction or order. The designers of hubs determine the order in which each port is addressed, and the administrator determines the order in which computers are connected to the hub. The IEEE 802.5 standard says clockwise; the IBM publication SC30-3374, section 3, says counterclockwise. </li></ul>
  66. 66. Token Ring <ul><li>B. Monitoring the System </li></ul><ul><li>1. First computer online is assigned to monitor network activity by the Token Ring system and is responsible for: </li></ul><ul><li>a. Frames being delivered and received correctly. </li></ul><ul><li>b. Frames that have circulated the ring more than once. </li></ul><ul><li>c. Ensuring only one token is on the network. </li></ul><ul><li>2. Process of monitoring is called beaconing. </li></ul><ul><li>a. Active monitor sends out a beacon announcement every seven seconds. </li></ul><ul><li>b. Beacon passed from computer to computer throughout the ring. </li></ul>
  67. 67. Token Ring <ul><li>c. If station does not receive an expected announcement from its upstream neighbor it sends a message including: </li></ul><ul><li>(1) Stations address </li></ul><ul><li>(2) Address of neighbor that did not announce </li></ul><ul><li>(3) Type of beacon </li></ul><ul><li>d. Ring attempts to diagnose and repair without disrupting the entire network. </li></ul><ul><li>  </li></ul><ul><li>When troubleshooting, be aware the network is trying to bypass the problem. This can sometimes mask the real failure. </li></ul>
  68. 68. Token Ring <ul><li>e. If unable to reconfigure automatically, manual intervention is required. </li></ul><ul><li>3. Recognizing a Computer. </li></ul><ul><li>a. When a new computer comes online the initialization includes: </li></ul><ul><li>(1) Checking for duplicate addresses. </li></ul><ul><li>(2) Notifying others of its existence. </li></ul>
  69. 69. Token Ring <ul><li>3. Hardware Components </li></ul><ul><li>A. The Hub </li></ul><ul><li>1. Overview </li></ul><ul><li>a. Token ring hub is known by several names: </li></ul><ul><li>(1) MAU (Multistation Access Unit) </li></ul><ul><li>(2) MSAU (MultiStation Access Unit) </li></ul><ul><li>(3) SMAU (Smart Multistation Access Unit) </li></ul><ul><li>b. The hub’s internal ring automatically converts to an external ring at each connection point when a computer is connected. </li></ul>Hub showing the internal ring and clockwise token path
  70. 70. Token Ring <ul><li>2. Capacity </li></ul><ul><li>a. IBM MSAU has 10 connection ports creating a logical ring of eight stations (two other ports extend the ring). </li></ul><ul><li>  </li></ul><ul><li>Some MSAU units are passive. For example, the IBM 8228. </li></ul><ul><li>  </li></ul><ul><li>b. Up to 33 hubs on a ring supporting 72 computers that use UTP or 260 that use STP on a MSAU-based network. </li></ul><ul><li>  </li></ul><ul><li>Other vendors offer hubs with more capacity; capacity depends on the vendor and the hub model. </li></ul>
  71. 71. Token Ring <ul><li>c. Hubs must be connected in a ring; ring-out on one hub must connect to ring-in on the adjacent hub. </li></ul><ul><li>d. Patch cables connect many MSAUs on top of each other while still forming a continuous ring. </li></ul>
  72. 72. Token Ring <ul><li>3. Built-in Fault Tolerance </li></ul><ul><li>a. NIC failure should bring down ring. </li></ul><ul><li>b. MSAU will sense a failed NIC and disconnect from it. </li></ul><ul><li>c. Faulty computer or connection will not affect rest of network. </li></ul>
  73. 73. Token Ring <ul><li>B. Cabling </li></ul><ul><li>1. Overview </li></ul><ul><li>a. IBM Type 1, 2, 3; </li></ul><ul><li> usually Type 3 UTP </li></ul><ul><li>cabling. </li></ul><ul><li>b. IBM states maximum </li></ul><ul><li> cabling distance MSAU to computer is 46 meters (150 feet), although some vendors say 152 meters (500 feet). </li></ul><ul><li>c. Maximum distance from one MSAU to another is 152 meters (500 feet). </li></ul><ul><li>d. Single Token Ring can accommodate only 260 computers with STP cable and 72 computers with UTP cable. </li></ul>
  74. 74. Token Ring <ul><li>2. Patch Cables </li></ul><ul><li>a. Extend connection between computer and MSAU or between two MSAUs. </li></ul><ul><li>b. IBM Type 6, up to a maximum of 46 meters (150 feet). </li></ul><ul><li>3. Connectors </li></ul><ul><li>a. Media interface connectors (MICs), also known as universal data connectors, connect Types 1 and 2 cable. </li></ul><ul><li>b. Neither male nor female so they can be connected together. </li></ul><ul><li>c. RJ-45 for 8-pin connection for Type 3 cable. </li></ul><ul><li>d. RJ-11 for 4-pin connection for Type 3 cable. </li></ul>
  75. 75. Token Ring <ul><li>e. Media filter required to make connection between Token Ring interface card and standard RJ-11/RJ-45 telephone jacks. </li></ul><ul><li>4. Media Filters </li></ul><ul><li>a. Required with Type 3 telephone twisted-pair cable. </li></ul><ul><li>b. Convert cable connectors and reduce line noise. </li></ul><ul><li>5. Patch Panels </li></ul><ul><li>a. Organize cable that runs between a MSAU and a telephone punchdown block. </li></ul><ul><li>b. Punchdown block is a kind of hardware that provides terminal connections for bare network cable ends. </li></ul>
  76. 76. Token Ring <ul><li>6. Repeaters </li></ul><ul><li>a. Increase Token Ring cable distances. </li></ul><ul><li>b. Actively regenerates and retimes the Token Ring signal. </li></ul><ul><li>7. NICs </li></ul><ul><li>a. Either 4 Mbps or 16 Mbps. </li></ul><ul><li>b. If the network is a 4 Mbps network, the 16 Mbps cards can be used, but will revert to 4 Mbps mode (16 Mbps networks will not accept slower 4 Mbps cards because they cannot speed up). </li></ul><ul><li>  </li></ul><ul><li>Different speed cards can exist on different logical segments. </li></ul>
  77. 77. Token Ring <ul><li>8. Fiber-Optic Cable </li></ul><ul><li>a. Well suited for unidirectional, high-speed fiber-optic cable. </li></ul><ul><li>b. Although more expensive, it greatly increases the range (up to 10 times that of copper). </li></ul>
  78. 78. Token Ring <ul><li>4. Future of Token Ring Networks </li></ul><ul><li>  </li></ul><ul><li>See Chapter 6 for discussion of protocols, routers, and bridges. </li></ul><ul><li>  </li></ul><ul><li>A. Overview </li></ul><ul><li>1. Token ring is losing market share to Ethernet. </li></ul><ul><li>2. Large companies are selecting Token Ring to support mission-critical applications. </li></ul><ul><li>B. Users of token ring face the following challenges: </li></ul><ul><li>1. Complexity, manageability, cost and space requirements </li></ul><ul><li>2. Bridge and segment congestion </li></ul><ul><li>3. Upgrading to high-speed technologies </li></ul>
  79. 79. Token Ring <ul><li>  See Token Ring specifications in Table 3.10 on page 151. </li></ul>
  80. 80. AppleTalk Network <ul><li>  AppleTalk Environment </li></ul><ul><li>A. AppleTalk </li></ul><ul><li>1. Overview </li></ul><ul><li>a. Apple Computer introduced AppleTalk in 1983 as proprietary network architecture for small groups. </li></ul><ul><li>b. Built into Macintosh computers. </li></ul><ul><li>c. AppleTalk Phase 2 is the current release of AppleTalk. </li></ul><ul><li>2. When a device attached to a LocalTalk network comes online, the following occurs in order: </li></ul><ul><li>a. Device checks to see if it has stored an address from a previous networking session. If not, the new device assigns itself a random address from a range of allowable addresses. </li></ul>
  81. 81. AppleTalk Network <ul><li>b. The device broadcasts the address to see if any other device is using it. </li></ul><ul><li>c. If no other device is using the address, the device stores address for the next time it comes online. </li></ul>AppleTalk network
  82. 82. AppleTalk Network <ul><li>B. LocalTalk </li></ul><ul><li>1. Overview </li></ul><ul><li>a. CSMA/CA access method in STP bus or tree topology. </li></ul><ul><li>b. Cabling components include cables, connector modules, and cable extenders. </li></ul><ul><li>c. Supports a maximum of 32 devices. </li></ul><ul><li>d. Other vendors offer more robust solutions. </li></ul>LocalTalk connector module with a LocalTalk cable
  83. 83. AppleTalk Network <ul><li>Can also accept UTP or fiber-optic cable. </li></ul><ul><li>  </li></ul><ul><li>2. Not widely used by Ethernet or Token Ring because: </li></ul><ul><li>a. Maximum communication data rate is 230.4 Kbps. </li></ul><ul><li>b. LocalTalk NICs for PC-compatible computers are obsolete. </li></ul><ul><li>C. AppleShare </li></ul><ul><li>1. AppleShare is the file server on AppleTalk network. </li></ul><ul><li>2. LocalTalk networks can be joined using zones. </li></ul><ul><li>3. Each zone is a workgroup and is given a name. </li></ul><ul><li>  </li></ul>
  84. 84. AppleTalk Network <ul><li>  </li></ul><ul><li>Workgroups are divided into zones to ease congestion. </li></ul>Three zones joined together to form a larger network.
  85. 85. AppleTalk Network <ul><li>D. EtherTalk </li></ul><ul><li>1. EtherTalk allows AppleTalk to use Ethernet coaxial cable (ThinNet or ThickNet). </li></ul><ul><li>2. EtherTalk card allows a Macintosh computer to connect and 802.3 Ethernet network. </li></ul><ul><li>E. TokenTalk </li></ul><ul><li>1. TokenTalk connects Macintosh II to an 802.5 Token Ring. </li></ul><ul><li>2. Compatible with AppleTalk Phase 2. </li></ul><ul><li>F. AppleTalk considerations </li></ul><ul><li>1. PCs and mainframes can use AppleTalk. </li></ul><ul><li>2. Apple encourages third-party use of network. </li></ul>
  86. 86. AppleTalk Network <ul><li>2. ArcNet Environment </li></ul><ul><li>A. Overview </li></ul><ul><li>1. Datapoint Corporation developed the Attached Resource Computer Network (ArcNet) in 1977. </li></ul><ul><li>  </li></ul><ul><li>ArcNet predates IEEE Project </li></ul><ul><li> 802 standards, but loosely </li></ul><ul><li>maps to the 802.4 standard. </li></ul>Simple Start-wired ArcNet network
  87. 87. AppleTalk Network <ul><li>2. Simple, inexpensive, flexible network architecture designed for workgroup-sized networks. </li></ul><ul><li>3. Token-passing bus networks using broadband cable. </li></ul><ul><li>4. Star bus or bus topology. </li></ul><ul><li>  </li></ul><ul><li>ArcNet is currently more expensive than Ethernet. </li></ul><ul><li>  </li></ul><ul><li>B. How ArcNet works: </li></ul><ul><li>1. Token-passing access method in a star bus. </li></ul><ul><li>2. 2.5 Mbps, although ArcNet Plus is 20 Mbps. </li></ul><ul><li>3. Token moves in numerical order of card address, regardless of where it is on the network. </li></ul>
  88. 88. AppleTalk Network <ul><li>| 4. ArcNet packet includes source and destination addresses, and up to 508 bytes of data. </li></ul><ul><li>C. Hardware </li></ul><ul><li>1. Hubs can be active, passive, or smart. </li></ul><ul><li>  </li></ul><ul><li>Instructor Note Smart hubs have all the features of active hubs and usually add diagnostic features such as reconfiguration detection and operator control-of-port connections. </li></ul><ul><li>  </li></ul><ul><li>2. Uses 93-ohm RG-62 A/U coaxial cable. </li></ul><ul><li>  </li></ul><ul><li>Instructor Note Unlike active hubs, unused ports on passive hubs must be terminated; they can also use mixture of hubs and bus. </li></ul><ul><li>  </li></ul><ul><li>3. Maximum cable length between active hub and workstation is 610 meters (2000 feet). </li></ul><ul><li>4. Maximum distance between drops on a linear coaxial bus is 305 meters (1000 feet). </li></ul><ul><li>5. Using UTP, maximum cable distance is 244 meters (800 feet) between devices on both star and bus topologies. </li></ul><ul><li>  </li></ul><ul><li>Instructor Note Discuss ArcNet Specifications, Table 3.11 on page 159. </li></ul>
  89. 89. AppleTalk Network <ul><li>| 4. ArcNet packet includes source and destination addresses, and up to 508 bytes of data. </li></ul>Token movement based on numerical order An ArcNet packet contains source and destination addresses
  90. 90. AppleTalk Network <ul><li>C. Hardware </li></ul><ul><li>1. Hubs can be active, passive, or smart. </li></ul><ul><li>  </li></ul><ul><li>Smart hubs have all the features of active hubs and usually add diagnostic features such as reconfiguration detection and operator control-of-port connections. </li></ul><ul><li>  </li></ul><ul><li>2. Uses 93-ohm RG-62 A/U coaxial cable. </li></ul><ul><li>  </li></ul><ul><li>Unlike active hubs, unused ports on passive hubs must be terminated; they can also use mixture of hubs and bus. </li></ul>
  91. 91. AppleTalk Network <ul><li>3. Maximum cable length between active hub and workstation is 610 meters (2000 feet). </li></ul><ul><li>4. Maximum distance between drops on a linear coaxial bus is 305 meters (1000 feet). </li></ul><ul><li>5. Using UTP, maximum cable distance is 244 meters (800 feet) between devices on both star and bus topologies. </li></ul><ul><li>  </li></ul><ul><li>Discuss ArcNet Specifications, Table 3.11 on page 159. </li></ul>
  92. 92. AppleTalk Network <ul><li>D. EtherTalk </li></ul><ul><li>1. EtherTalk allows AppleTalk to use Ethernet coaxial cable (ThinNet or ThickNet). </li></ul><ul><li>2. EtherTalk card allows a Macintosh computer to connect and 802.3 Ethernet network. </li></ul><ul><li>E. TokenTalk </li></ul><ul><li>1. TokenTalk connects Macintosh II to an 802.5 Token Ring. </li></ul><ul><li>2. Compatible with AppleTalk Phase 2. </li></ul><ul><li>F. AppleTalk considerations </li></ul><ul><li>1. PCs and mainframes can use AppleTalk. </li></ul><ul><li>2. Apple encourages third-party use of network. </li></ul><ul><li>|38| 2. ArcNet Environment </li></ul><ul><li>A. Overview </li></ul><ul><li>1. Datapoint Corporation developed the Attached Resource Computer Network (ArcNet) in 1977. </li></ul><ul><li>  </li></ul><ul><li>Instructor Note ArcNet predates IEEE Project 802 standards, but loosely maps to the 802.4 standard. </li></ul><ul><li>  </li></ul><ul><li>2. Simple, inexpensive, flexible network architecture designed for workgroup-sized networks. </li></ul><ul><li>3. Token-passing bus networks using broadband cable. </li></ul><ul><li>4. Star bus or bus topology. </li></ul><ul><li>  </li></ul><ul><li>Instructor Note ArcNet is currently more expensive than Ethernet. </li></ul><ul><li>  </li></ul><ul><li>B. How ArcNet works: </li></ul><ul><li>1. Token-passing access method in a star bus. </li></ul><ul><li>2. 2.5 Mbps, although ArcNet Plus is 20 Mbps. </li></ul><ul><li>|39| 3. Token moves in numerical order of card address, regardless of where it is on the network. </li></ul><ul><li>|40| 4. ArcNet packet includes source and destination addresses, and up to 508 bytes of data. </li></ul><ul><li>C. Hardware </li></ul><ul><li>1. Hubs can be active, passive, or smart. </li></ul><ul><li>  </li></ul><ul><li>Instructor Note Smart hubs have all the features of active hubs and usually add diagnostic features such as reconfiguration detection and operator control-of-port connections. </li></ul><ul><li>  </li></ul><ul><li>2. Uses 93-ohm RG-62 A/U coaxial cable. </li></ul><ul><li>  </li></ul><ul><li>Instructor Note Unlike active hubs, unused ports on passive hubs must be terminated; they can also use mixture of hubs and bus. </li></ul><ul><li>  </li></ul><ul><li>3. Maximum cable length between active hub and workstation is 610 meters (2000 feet). </li></ul><ul><li>4. Maximum distance between drops on a linear coaxial bus is 305 meters (1000 feet). </li></ul><ul><li>5. Using UTP, maximum cable distance is 244 meters (800 feet) between devices on both star and bus topologies. </li></ul><ul><li>  </li></ul><ul><li>Instructor Note Discuss ArcNet Specifications, Table 3.11 on page 159. </li></ul>

×